Publications équipe CRYPTO 2004 à 2007

  1. Louis Goubin, Jean-Michel Masereel and Michael Quisquater. Cryptanalysis of white box DES implementations. IACR ePrint Archive, 2007/035, 2007. BibTeX

    @techreport{GMQu07b,
    	author = "Goubin, Louis and Masereel, Jean-Michel and Quisquater, Michael",
    	title = "{Cryptanalysis of white box DES implementations}",
    	institution = "IACR ePrint Archive, 2007/035",
    	year = 2007
    }
    
  2. Louis Goubin and Giuseppe Persiano. New Technical Trends in Asymmetric Cryptography. Rapport D.AZTEC.7 du réseau européen d'excellence en cryptologie (ECRYPT), 2007. BibTeX

    @techreport{GoPe+07,
    	author = "Goubin, Louis and Persiano, Giuseppe",
    	title = "{New Technical Trends in Asymmetric Cryptography}",
    	institution = "Rapport D.AZTEC.7 du réseau européen d'excellence en cryptologie (ECRYPT)",
    	year = 2007
    }
    
  3. Christophe Giraud and Hugues Thiebeauld. The Difficulty of Securing Software Applications on Smart Cards with Unknown Architecture. In E-Smart. 2007. BibTeX

    @inproceedings{GiTh07,
    	author = "Giraud, Christophe and Thiebeauld, Hugues",
    	title = "{The Difficulty of Securing Software Applications on Smart Cards with Unknown Architecture}",
    	booktitle = "E-Smart",
    	year = 2007
    }
    
  4. Christophe Clavier and Jean-Sebastien Coron. On the implementation of a fast prime generation algorithm. In Pascal Paillier and Ingrid Verbauwhede (eds.). Cryptographic Hardware and Embedded Systems, CHES 2007 4727. 2007, 443-449. BibTeX

    @inproceedings{ClCo07,
    	author = "Clavier, Christophe and Coron, Jean-Sebastien",
    	title = "{On the implementation of a fast prime generation algorithm}",
    	booktitle = "Cryptographic Hardware and Embedded Systems, CHES 2007",
    	pages = "443-449",
    	year = 2007,
    	editor = "Pascal Paillier and Ingrid Verbauwhede",
    	volume = 4727,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  5. Christophe Clavier. Secret external encodings do not prevent transient fault analysis. In Pascal Paillier and Ingrid Verbauwhede (eds.). Cryptographic Hardware and Embedded Systems, CHES 2007 4727. 2007, 181-194. BibTeX

    @inproceedings{Clav07c,
    	author = "Clavier, Christophe",
    	title = "{Secret external encodings do not prevent transient fault analysis}",
    	booktitle = "Cryptographic Hardware and Embedded Systems, CHES 2007",
    	pages = "181-194",
    	year = 2007,
    	editor = "Pascal Paillier and Ingrid Verbauwhede",
    	volume = 4727,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  6. Christophe Clavier. An improved SCARE cryptanalysis against a secret A3/A8 GSM algorithm. In International Conference on Information Systems Security. 2007. BibTeX

    @inproceedings{Clav07b,
    	author = "Clavier, Christophe",
    	title = "{An improved SCARE cryptanalysis against a secret A3/A8 GSM algorithm}",
    	booktitle = "International Conference on Information Systems Security",
    	year = 2007,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  7. Nicolas Courtois and Blandine Debraize. S-box Multivariate Equations that Allow Faster Algebraic Attacks on Block Ciphers. In Weworc. 2007. BibTeX

    @inproceedings{CoDe07,
    	author = "Courtois, Nicolas and Blandine Debraize",
    	title = "{S-box Multivariate Equations that Allow Faster Algebraic Attacks on Block Ciphers}",
    	booktitle = "Weworc",
    	year = 2007
    }
    
  8. Krystian Matusiewicz, Thomas Peyrin, Olivier Billet, Scott Contini and Josef Pieprzyk. Cryptanalysis of FORK-256. In Fast Software Encryption 4593. 2007. 14th International Workshop, FSE 2007. BibTeX

    @inproceedings{MPB+07,
    	author = "Matusiewicz, Krystian and Peyrin, Thomas and Billet, Olivier and Contini, Scott and Pieprzyk, Josef",
    	title = "{Cryptanalysis of FORK-256}",
    	booktitle = "Fast Software Encryption",
    	year = 2007,
    	volume = 4593,
    	series = "LNCS",
    	address = "Luxembourg, Luxembourg",
    	month = "",
    	publisher = "Springer-Verlag",
    	note = "14th International Workshop, FSE 2007"
    }
    
  9. Thomas Peyrin. Cryptanalysis of Grindahl. In Proceedings of Advances in Cryptology - ASIACRYPT 2007. 2007. 13th International Conference on the Theory and Application of Cryptology and Information Security. BibTeX

    @inproceedings{Peyr07,
    	author = "Peyrin, Thomas",
    	title = "{Cryptanalysis of Grindahl}",
    	booktitle = "Proceedings of Advances in Cryptology - ASIACRYPT 2007",
    	year = 2007,
    	series = "LNCS",
    	address = "Kuching, Malaysia",
    	month = "",
    	publisher = "Springer-Verlag",
    	note = "13th International Conference on the Theory and Application of Cryptology and Information Security"
    }
    
  10. Andrey Bogdanov, Lars Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew Robshaw, Yannick Seurin and Charlotte Vikkelsoe. PRESENT: An Ultra-Lightweight Block Cipher. In Proceedings of CHES 4727. 2007, 450-466. BibTeX

    @inproceedings{BKL+07,
    	author = "Bogdanov, Andrey and Knudsen, Lars and Leander, Gregor and Paar, Christof and Poschmann, Axel and Robshaw, Matthew and Seurin, Yannick and Vikkelsoe, Charlotte",
    	title = "{PRESENT: An Ultra-Lightweight Block Cipher}",
    	booktitle = "Proceedings of CHES",
    	pages = "450-466",
    	year = 2007,
    	volume = 4727,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  11. Yannick Seurin and Thomas Peyrin. Security Analysis of Constructions Combining FIL Random Oracles. In Proceedings of FSE 4593. 2007, 119-136. BibTeX

    @inproceedings{SePe07,
    	author = "Seurin, Yannick and Peyrin, Thomas",
    	title = "{Security Analysis of Constructions Combining FIL Random Oracles}",
    	booktitle = "Proceedings of FSE",
    	pages = "119-136",
    	year = 2007,
    	volume = 4593,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  12. Emmanuel Bresson, Benoit Chevallier-Mames, Christophe Clavier, Blandine Debraize, Pierre-Alain Fouque, Louis Goubin, Aline Gouget, Gaëtan Leurent, Phong Q Nguyen, Pascal Paillier, Thomas Peyrin and Sébastien Zimmer. Revisiting security relations between signature schemes and their inner hash functions. In ECRYPT Hash Workshop. 2007. BibTeX

    @inproceedings{BCC+07,
    	author = "Bresson, Emmanuel and Chevallier-Mames, Benoit and Clavier, Christophe and Debraize, Blandine and Fouque, Pierre-Alain and Goubin, Louis and Gouget, Aline and Leurent, Gaëtan and Nguyen, Phong Q. and Paillier, Pascal and Peyrin, Thomas and Zimmer, Sébastien",
    	title = "{Revisiting security relations between signature schemes and their inner hash functions}",
    	booktitle = "ECRYPT Hash Workshop",
    	year = 2007,
    	address = "Barcelone"
    }
    
  13. Blandine Debraize and Louis Goubin. Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator. In Workshop Tools for Cryptanalysis. 2007. BibTeX

    @inproceedings{DeGo07,
    	author = "Debraize, Blandine and Goubin, Louis",
    	title = "{Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator}",
    	booktitle = "Workshop Tools for Cryptanalysis",
    	year = 2007,
    	address = "Cracovie, Pologne",
    	month = ""
    }
    
  14. Claude Barral, Louis Goubin and Pascal Paillier. The Fuzzy Interaction between Cryptography & Biometrics. In Proceedings of E-Smart. 2007. BibTeX

    @inproceedings{BGPa07,
    	author = "Barral, Claude and Goubin, Louis and Paillier, Pascal",
    	title = "{The Fuzzy Interaction between Cryptography \& Biometrics}",
    	booktitle = "Proceedings of E-Smart",
    	year = 2007,
    	address = "Sophia-Antipolis"
    }
    
  15. Antoine Joux and Jean-Rene Reinhard. Overtaking VEST. In Proceedings of FSE. 2007, 58-72. BibTeX

    @inproceedings{JoRe07,
    	author = "Joux, Antoine and Reinhard, Jean-Rene",
    	title = "{Overtaking VEST}",
    	booktitle = "Proceedings of FSE",
    	pages = "58-72",
    	year = 2007,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  16. Aurélie Bauer and Antoine Joux. Toward a Rigorous Variation of Coppersmith's Algorithm on Three Variables. In Proceedings of EUROCRYPT. 2007, 361-378. BibTeX

    @inproceedings{BaJo07,
    	author = "Bauer, Aurélie and Joux, Antoine",
    	title = "{Toward a Rigorous Variation of Coppersmith's Algorithm on Three Variables}",
    	booktitle = "Proceedings of EUROCRYPT",
    	pages = "361-378",
    	year = 2007,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  17. Antoine Joux and Thomas Peyrin. Hash Functions and the (Amplified) Boomerang Attack. In Proceedings of CRYPTO. 2007, 244-263. BibTeX

    @inproceedings{JoPe07,
    	author = "Joux, Antoine and Peyrin, Thomas",
    	title = "{Hash Functions and the (Amplified) Boomerang Attack}",
    	booktitle = "Proceedings of CRYPTO",
    	pages = "244-263",
    	year = 2007,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  18. Antoine Joux, David Naccache and Emmanuel Thome. When e-th Roots Become Easier Than Factoring. In Proceedings of ASIACRYPT 4833. 2007, 13-28. BibTeX

    @inproceedings{JNTh07,
    	author = "Joux, Antoine and Naccache, David and Thome, Emmanuel",
    	title = "{When e-th Roots Become Easier Than Factoring}",
    	booktitle = "Proceedings of ASIACRYPT",
    	pages = "13-28",
    	year = 2007,
    	volume = 4833,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  19. Louis Goubin, Jean-Michel Masereel and Michael Quisquater. Cryptanalysis of White Box DES Implementations. In Selected Areas in Cryptography 4876. 2007, 278-295. BibTeX

    @inproceedings{GMQu07,
    	author = "Goubin, Louis and Masereel, Jean-Michel and Quisquater, Michael",
    	title = "{Cryptanalysis of White Box DES Implementations}",
    	booktitle = "Selected Areas in Cryptography",
    	pages = "278-295",
    	year = 2007,
    	volume = 4876,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  20. Jacques Patarin and Berbain Côme Nachef Valérie and. Generic attacks on unbalanced Feistel Schemes with expanding functions. In Proceedings of ASIACRYPT 4833. 2007, 325-341. BibTeX

    @inproceedings{PNBe07,
    	author = "Patarin, Jacques and Nachef, Valérie and, Berbain, Côme",
    	title = "{Generic attacks on unbalanced Feistel Schemes with expanding functions}",
    	booktitle = "Proceedings of ASIACRYPT",
    	pages = "325-341",
    	year = 2007,
    	volume = 4833,
    	series = "LNCS",
    	publisher = "Springer"
    }
    
  21. Côme Berbain, Olivier Billet and Henri Gilbert. Efficient Implementations of Multivariate Quadratic Systems. In Proceedings of Selected Areas in Cryptography SAC 2006 4356. 2007. 13th International Workshop. BibTeX

    @inproceedings{BBGi06,
    	author = "Berbain, Côme and Billet, Olivier and Gilbert, Henri",
    	title = "{Efficient Implementations of Multivariate Quadratic Systems}",
    	booktitle = "Proceedings of Selected Areas in Cryptography SAC 2006",
    	year = 2007,
    	volume = 4356,
    	series = "LNCS",
    	address = "Montreal, Canada",
    	month = "",
    	publisher = "Springer",
    	note = "13th International Workshop"
    }
    
  22. Christophe Clavier. Attaques physiques sur cartes à microprocesseur par injection de fautes. UVSQ, 2007. BibTeX

    @phdthesis{Clav07a,
    	author = "Clavier, Christophe",
    	title = "Attaques physiques sur cartes à microprocesseur par injection de fautes",
    	school = "UVSQ",
    	year = 2007,
    	month = ""
    }
    
  23. Christophe Giraud. Attaques de cryptosystèmes embarqués et contre-mesures associées. UVSQ, 2007. BibTeX

    @phdthesis{ Gira07,
    	author = "Giraud, Christophe",
    	title = "Attaques de cryptosystèmes embarqués et contre-mesures associées",
    	school = "UVSQ",
    	year = 2007,
    	month = ""
    }
    

  1. Christophe Giraud. An RSA Implementation Resistant to Fault Attacks and to Simple Power Analysis. IEEE Transactions on Computers 55(9):1116-1120, septembre 2006. BibTeX

    @article{Gira06,
    	author = "Giraud, Christophe",
    	title = "{An RSA Implementation Resistant to Fault Attacks and to Simple Power Analysis}",
    	journal = "IEEE Transactions on Computers",
    	pages = "1116-1120",
    	year = 2006,
    	volume = 55,
    	number = 9,
    	series = "IEEE",
    	month = "sep"
    }
    
  2. David Azemard, Abdellatif Benjelloun-Touimi, Claude Delpha, Pierre Duhamel, Jean-Bernard Fischer, Caroline Fontaine, Christophe Giraud, Alain Le Guyader, Patrice Martin and Michel Milhau. Secured Diffusionof Music on mobile : a Convincing and Practical Security Model for Content Protection. In e-Smart. 2006. BibTeX

    @inproceedings{ABD+06a,
    	author = "Azemard, David and Benjelloun-Touimi, Abdellatif and Delpha, Claude and Duhamel, Pierre and Fischer, Jean-Bernard and Fontaine, Caroline and Giraud, Christophe and Le Guyader, Alain and Martin, Patrice and Milhau, Michel",
    	title = "{Secured Diffusionof Music on mobile : a Convincing and Practical Security Model for Content Protection}",
    	booktitle = "e-Smart",
    	year = 2006
    }
    
  3. Emmanuel Prouff, Christophe Giraud and Sébastien Aumônier. Provably Secure S-Box Implementation Based on Fourier Transform. In Cryptographic Hardware and Embedded Systems, CHES 2006 4249. 2006, 216-230. BibTeX

    @inproceedings{PGAu06,
    	author = "Prouff, Emmanuel and Giraud, Christophe and Aumônier, Sébastien",
    	title = "{Provably Secure S-Box Implementation Based on Fourier Transform}",
    	booktitle = "Cryptographic Hardware and Embedded Systems, CHES 2006",
    	pages = "216-230",
    	year = 2006,
    	volume = 4249,
    	series = "LNCS",
    	publisher = "Springer"
    }
    
  4. Abdellatif Benjelloun-Touimi, Jean-Bernard Fischer, Caroline Fontaine, Christophe Giraud and Michel Milhau. Enhanced Security Architecture for Music Distribution on Mobile. In 11th European Symposium on Research in Computer Security, ESORICS 2006 4189. 2006, 97-109. BibTeX

    @inproceedings{BFF+06,
    	author = "Benjelloun-Touimi, Abdellatif and Fischer, Jean-Bernard and Fontaine, Caroline and Giraud, Christophe and Milhau, Michel",
    	title = "{Enhanced Security Architecture for Music Distribution on Mobile}",
    	booktitle = "11th European Symposium on Research in Computer Security, ESORICS 2006",
    	pages = "97-109",
    	year = 2006,
    	volume = 4189,
    	series = "LNCS",
    	publisher = "Springer"
    }
    
  5. Yannick Monnet, Marc Renaudin, Régis Leveugle, Christophe Clavier and Pascal Moitrel. Case study of a fault attack on asynchronous DES cryptoprocessors. In David Naccache Luca Breveglieri Israel Koren and Jean-Pierre Seifert (eds.). Fault Diagnosis and Tolerance in Cryptography FDTC 06 4236. 2006, 88-97. BibTeX

    @inproceedings{MRL+06,
    	author = "Monnet, Yannick and Renaudin, Marc and Leveugle, Régis and Clavier, Christophe and Moitrel, Pascal",
    	title = "{Case study of a fault attack on asynchronous DES cryptoprocessors}",
    	booktitle = "Fault Diagnosis and Tolerance in Cryptography FDTC 06",
    	pages = "88-97",
    	year = 2006,
    	editor = "Luca Breveglieri, Israel Koren, David Naccache and Jean-Pierre Seifert",
    	volume = 4236,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  6. Eric Brier, Benoit Chevallier-Mames, Mathieu Ciet and Christophe Clavier. Why one should also secure RSA public key elements. In Mitsuru Matsui Louis Goubin (ed.). Cryptographic Hardware and Embedded Systems 4249. 2006, 324-338. BibTeX

    @inproceedings{BCCC06,
    	author = "Brier, Eric and Chevallier-Mames, Benoit and Ciet, Mathieu and Clavier, Christophe",
    	title = "{Why one should also secure RSA public key elements}",
    	booktitle = "Cryptographic Hardware and Embedded Systems",
    	pages = "324-338",
    	year = 2006,
    	editor = "Louis Goubin, Mitsuru Matsui",
    	volume = 4249,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  7. Frédéric Amiel, Christophe Clavier and Michael Tunstall. Fault analysis of DPA-resistant algorithms. In David Naccache Luca Breveglieri Israel Koren and Jean-Pierre Seifert (eds.). Fault Diagnosis and Tolerance in Cryptography FDTC 06 4236. 2006, 223-236. BibTeX

    @inproceedings{ACTu06,
    	author = "Amiel, Frédéric and Clavier, Christophe and Tunstall, Michael",
    	title = "{Fault analysis of DPA-resistant algorithms}",
    	booktitle = "Fault Diagnosis and Tolerance in Cryptography FDTC 06",
    	pages = "223-236",
    	year = 2006,
    	editor = "Luca Breveglieri, Israel Koren, David Naccache and Jean-Pierre Seifert",
    	volume = 4236,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  8. Nicolas Courtois, Blandine Debraize and Eric Garrido. On Exact Algebraic [Non-]Immunity of S-Boxes Based on Power Functions. In Proceedings of Australasian Conference on Information Security and Privacy 4058. 2006, 76-86. BibTeX

    @inproceedings{CDGa06,
    	author = "Courtois, Nicolas and Debraize, Blandine and Garrido, Eric",
    	title = "{On Exact Algebraic [Non-]Immunity of S-Boxes Based on Power Functions}",
    	booktitle = "Proceedings of Australasian Conference on Information Security and Privacy",
    	pages = "76-86",
    	year = 2006,
    	volume = 4058,
    	series = "LNCS",
    	publisher = "Springer"
    }
    
  9. Olivier Billet and Henri Gilbert. Cryptanalysis of Rainbow. In Proceedings of Security and Cryptography for Networks 4116. 2006. 5th International Conference. BibTeX

    @inproceedings{BiGi06,
    	author = "Billet, Olivier and Gilbert, Henri",
    	title = "{Cryptanalysis of Rainbow}",
    	booktitle = "Proceedings of Security and Cryptography for Networks",
    	year = 2006,
    	volume = 4116,
    	series = "LNCS",
    	address = "Maiori, Italy",
    	month = "",
    	publisher = "Springer",
    	note = "5th International Conference"
    }
    
  10. Frédéric Muller and Thomas Peyrin. Cryptanalysis of T-Function-Based Hash Functions. In Proceedings of ICISC 4296. 2006. 9th International Conference. BibTeX

    @inproceedings{MuPe06,
    	author = "Muller, Frédéric and Peyrin, Thomas",
    	title = "{Cryptanalysis of T-Function-Based Hash Functions}",
    	booktitle = "Proceedings of ICISC",
    	year = 2006,
    	volume = 4296,
    	series = "LNCS",
    	address = "Busan, Korea",
    	month = "",
    	publisher = "Springer",
    	note = "9th International Conference"
    }
    
  11. Thomas Peyrin, Henri Gilbert, Frédéric Muller and Matthew Robshaw. Combining Compression Functions and Block Cipher-Based Hash Functions. In Proceedings of Advances in Cryptology - ASIACRYPT 4284. 2006. 12th International Conference on the Theory and Application of Cryptology and Information Security. BibTeX

    @inproceedings{PGMR06,
    	author = "Peyrin, Thomas and Gilbert, Henri and Muller, Frédéric and Robshaw, Matthew",
    	title = "{Combining Compression Functions and Block Cipher-Based Hash Functions}",
    	booktitle = "Proceedings of Advances in Cryptology - ASIACRYPT",
    	year = 2006,
    	volume = 4284,
    	series = "LNCS",
    	address = "Shanghai, China",
    	month = "",
    	publisher = "Springer",
    	note = "12th International Conference on the Theory and Application of Cryptology and Information Security"
    }
    
  12. Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas Courtois, Blandine Debraize, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin and Hervé Sibert. DecimV2. In Proceedings of SASC. 2006. BibTeX

    @inproceedings{BBC+06,
    	author = "Berbain, Côme and Billet, Olivier and Canteaut, Anne and Courtois, Nicolas and Debraize, Blandine and Gilbert, Henri and Goubin, Louis and Gouget, Aline and Granboulan, Louis and Lauradoux, Cédric and Minier, Marine and Pornin, Thomas and Sibert, Hervé",
    	title = "{DecimV2}",
    	booktitle = "Proceedings of SASC",
    	year = 2006,
    	address = "Leuven, Belgium",
    	month = ""
    }
    
  13. Nicolas Courtois and Louis Goubin. Cryptology and Smart Cards: the Way to Go. In Proceedings of E-Smart. 2006. BibTeX

    @inproceedings{CoGo06,
    	author = "Courtois, Nicolas and Goubin, Louis",
    	title = "{Cryptology and Smart Cards: the Way to Go}",
    	booktitle = "Proceedings of E-Smart",
    	year = 2006,
    	address = "Sophia-Antipolis"
    }
    
  14. Antoine Joux and Frédéric Muller. Chosen-Ciphertext Attacks Against MOSQUITO. In Proceedings of FSE 4047. 2006, 390-404. BibTeX

    @inproceedings{JoMu06,
    	author = "Joux, Antoine and Muller, Frédéric",
    	title = "{Chosen-Ciphertext Attacks Against MOSQUITO}",
    	booktitle = "Proceedings of FSE",
    	pages = "390-404",
    	year = 2006,
    	volume = 4047,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  15. Louis Granboulan, Antoine Joux and Jacques Stern. Inverting HFE is Quasipolynomial. In Proceedings of CRYPTO 4117. 2006, 345-356. BibTeX

    @inproceedings{GJSt06,
    	author = "Granboulan, Louis and Joux, Antoine and Stern, Jacques",
    	title = "{Inverting HFE is Quasipolynomial}",
    	booktitle = "Proceedings of CRYPTO",
    	pages = "345-356",
    	year = 2006,
    	volume = 4117,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  16. Antoine Joux, Reynald Lercier, Nigel Smart and Frederik Vercauteren. The Number Field Sieve in the Medium Prime Case. In Proceedings of CRYPTO 4117. 2006, 326-344. BibTeX

    @inproceedings{JLSV06,
    	author = "Joux, Antoine and Lercier, Reynald and Smart, Nigel and Vercauteren, Frederik",
    	title = "{The Number Field Sieve in the Medium Prime Case}",
    	booktitle = "Proceedings of CRYPTO",
    	pages = "326-344",
    	year = 2006,
    	volume = 4117,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  17. Antoine Joux and Pascal Delaunay. Galois LFSR, Embedded Devices and Side Channel Weaknesses. In Proceedings of INDOCRYPT 4329. 2006, 436-451. BibTeX

    @inproceedings{JoDe06,
    	author = "Joux, Antoine and Delaunay, Pascal",
    	title = "{Galois LFSR, Embedded Devices and Side Channel Weaknesses}",
    	booktitle = "Proceedings of INDOCRYPT",
    	pages = "436-451",
    	year = 2006,
    	volume = 4329,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  18. Côme Berbain, Henri Gilbert and Jacques Patarin. Quad: a Practical Stream Cipher with Provable Security. In Proceedings of EUROCRYPT 4004. 2006, 109-128. BibTeX

    @inproceedings{BGPa06,
    	author = "Berbain, Côme and Gilbert, Henri and Patarin, Jacques",
    	title = "{Quad: a Practical Stream Cipher with Provable Security}",
    	booktitle = "Proceedings of EUROCRYPT",
    	pages = "109-128",
    	year = 2006,
    	volume = 4004,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  19. Antoine Joux and Reynald Lercier. The Function Field Sieve in the Medium Prime Case. In Proceedings of EUROCRYPT 4004. 2006, 254-270. BibTeX

    @inproceedings{JoLe06,
    	author = "Joux, Antoine and Lercier, Reynald",
    	title = "{The Function Field Sieve in the Medium Prime Case}",
    	booktitle = "Proceedings of EUROCRYPT",
    	pages = "254-270",
    	year = 2006,
    	volume = 4004,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  20. Jacques Patarin and Berbain Côme Nachef Valérie and. Generic attacks on unbalanced Feistel Schemes with contracting functions. In Proceedings of ASIACRYPT 4284. 2006, 396-411. BibTeX

    @inproceedings{PNBe06,
    	author = "Patarin, Jacques and Nachef, Valérie and, Berbain, Côme",
    	title = "{Generic attacks on unbalanced Feistel Schemes with contracting functions}",
    	booktitle = "Proceedings of ASIACRYPT",
    	pages = "396-411",
    	year = 2006,
    	volume = 4284,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  21. Louis Goubin. La Sécurité Multimédia. Chapter Cartes à puces, Hermes Science, 2006. BibTeX

    @inbook{Goub06,
    	author = "Goubin, Louis",
    	title = "La Sécurité Multimédia",
    	chapter = "Cartes à puces",
    	publisher = "Hermes Science",
    	year = 2006
    }
    
  22. Louis Goubin and Mitsuru Matsui (eds.). Proceedings of the CHES'2006 conference (Cryptographic Hardware and Embedded Systems) 4249. Springer-Verlag, 2006. BibTeX

    @proceedings{GoMa06,
    	editor = "Goubin, Louis and Matsui, Mitsuru",
    	title = "Proceedings of the CHES'2006 conference (Cryptographic Hardware and Embedded Systems)",
    	booktitle = "CHESS'06",
    	publisher = "Springer-Verlag",
    	series = "Lecture Notes in Computer Science",
    	volume = 4249,
    	year = 2006
    }
    
  23. Audrey Montreuil. Mariage et Papillons (calcul multi-parties et schéma de Benes revisité). UVSQ, 2006. BibTeX

    @phdthesis{Mont06,
    	author = "Montreuil, Audrey",
    	title = "Mariage et Papillons (calcul multi-parties et schéma de Benes revisité)",
    	school = "UVSQ",
    	year = 2006,
    	month = ""
    }
    

  1. Jacques Patarin. On Linear Systems of Equations with Distinct Variables and small Block Size. In Proceedings of ICISC. décembre 2005. BibTeX

    @inproceedings{Pata05b,
    	author = "Patarin, Jacques",
    	title = "{On Linear Systems of Equations with Distinct Variables and small Block Size}",
    	booktitle = "Proceedings of ICISC",
    	year = 2005,
    	month = "dec"
    }
    
  2. Jacques Patarin and Audrey Montreuil. Benes and Butterfly Schemes Revisited. In Proceedings of ICISC. décembre 2005. BibTeX

    @inproceedings{Pata05a,
    	author = "Patarin, Jacques and Montreuil, Audrey",
    	title = "{Benes and Butterfly Schemes Revisited}",
    	booktitle = "Proceedings of ICISC",
    	year = 2005,
    	month = "dec"
    }
    
  3. Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas Courtois, Blandine Debraize, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin and Hervé Sibert. DECIM, a new stream cipher for hardware applications. In Proceedings of Symmetric Key Encryption Workshop. mai 2005. BibTeX

    @inproceedings{BBC+05b,
    	author = "Berbain, Côme and Billet, Olivier and Canteaut, Anne and Courtois, Nicolas and Debraize, Blandine and Gilbert, Henri and Goubin, Louis and Gouget, Aline and Granboulan, Louis and Lauradoux, Cédric and Minier, Marine and Pornin, Thomas and Sibert, Hervé",
    	title = "{DECIM, a new stream cipher for hardware applications}",
    	booktitle = "Proceedings of Symmetric Key Encryption Workshop",
    	year = 2005,
    	series = "LNCS",
    	address = "Aarhus, Denmark",
    	month = "may"
    }
    
  4. Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas Courtois, Blandine Debraize, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin and Hervé Sibert. DECIM, a new Stream Cipher for Hardware applications. ECRYPT Stream Cipher Project Report 2005/027, 2005. BibTeX

    @techreport{BBC+05d,
    	author = "Berbain, Côme and Billet, Olivier and Canteaut, Anne and Courtois, Nicolas and Debraize, Blandine and Gilbert, Henri and Goubin, Louis and Gouget, Aline and Granboulan, Louis and Lauradoux, Cédric and Minier, Marine and Pornin, Thomas and Sibert, Hervé",
    	title = "{DECIM, a new Stream Cipher for Hardware applications}",
    	institution = "ECRYPT Stream Cipher Project Report 2005/027",
    	year = 2005
    }
    
  5. Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas Courtois, Blandine Debraize, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin and Hervé Sibert. Sosemanuk, a fast software-oriented stream cipher. ECRYPT Stream Cipher Project Report 2005/027, 2005. BibTeX

    @techreport{BBC+05c,
    	author = "Berbain, Côme and Billet, Olivier and Canteaut, Anne and Courtois, Nicolas and Debraize, Blandine and Gilbert, Henri and Goubin, Louis and Gouget, Aline and Granboulan, Louis and Lauradoux, Cédric and Minier, Marine and Pornin, Thomas and Sibert, Hervé",
    	title = "{Sosemanuk, a fast software-oriented stream cipher}",
    	institution = "ECRYPT Stream Cipher Project Report 2005/027",
    	year = 2005
    }
    
  6. Nicolas Courtois and Louis Goubin. An Algebraic Masking Method to Protect AES Against Power Attacks. IACR ePrint Archive, 2005/204, 2005. BibTeX

    @techreport{CoGo05b,
    	author = "Courtois, Nicolas and Goubin, Louis",
    	title = "{An Algebraic Masking Method to Protect AES Against Power Attacks}",
    	institution = "IACR ePrint Archive, 2005/204",
    	year = 2005
    }
    
  7. Aline Gouget, Hervé Sibert, Côme Berbain, Nicolas Courtois, Blandine Debraize and Chris J Mitchell. Analysis of the Bit-Search Generator and Sequence Compression Techniques. In Fast Software Encryption 3557. 2005, 196-214. BibTeX

    @inproceedings{GSB+05,
    	author = "Gouget, Aline and Sibert, Hervé and Berbain, Côme and Courtois, Nicolas and Debraize, Blandine and Mitchell,Chris J.",
    	title = "{Analysis of the Bit-Search Generator and Sequence Compression Techniques}",
    	booktitle = "Fast Software Encryption",
    	pages = "196-214",
    	year = 2005,
    	volume = 3557,
    	series = "LNCS",
    	publisher = "Springer"
    }
    
  8. Olivier Billet and Henri Gilbert. Resistance of SNOW 2.0 Against Algebraic Attacks. In Topics in Cryptology-CT-RSA 3376. 2005, 19-28. BibTeX

    @inproceedings{BiGi05,
    	author = "Billet, Olivier and Gilbert, Henri",
    	title = "{Resistance of SNOW 2.0 Against Algebraic Attacks}",
    	booktitle = "Topics in Cryptology-CT-RSA",
    	pages = "19-28",
    	year = 2005,
    	volume = 3376,
    	series = "LNCS",
    	publisher = "Springer"
    }
    
  9. Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas Courtois, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin and Hervé Sibert. SOSEMANUK, a fast software-oriented stream cipher. In Proceedings of Symmetric Key Encryption Workshop. 2005. BibTeX

    @inproceedings{BBC+05a,
    	author = "Berbain, Côme and Billet, Olivier and Canteaut, Anne and Courtois, Nicolas and Gilbert, Henri and Goubin, Louis and Gouget, Aline and Granboulan, Louis and Lauradoux, Cédric and Minier, Marine and Pornin, Thomas and Sibert, Hervé",
    	title = "{SOSEMANUK, a fast software-oriented stream cipher}",
    	booktitle = "Proceedings of Symmetric Key Encryption Workshop",
    	year = 2005,
    	series = "LNCS",
    	address = "Aarhus, Denmark",
    	month = ""
    }
    
  10. Nicolas Courtois and Louis Goubin. An Algebraic Masking Method to Protect AES Against Power Attacks. In Proceedings of ICISC. 2005. BibTeX

    @inproceedings{CoGo05a,
    	author = "Courtois, Nicolas and Goubin, Louis",
    	title = "{An Algebraic Masking Method to Protect AES Against Power Attacks}",
    	booktitle = "Proceedings of ICISC",
    	year = 2005,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  11. Antoine Joux, Sébastien Kunz-Jacques, Frédéric Muller and Pierre-Michel Ricordel. Cryptanalysis of the Tractable Rational Map Cryptosystem. In Proceedings of Public Key Cryptography. 2005, 258-274. BibTeX

    @inproceedings{JKMR05,
    	author = "Joux, Antoine and Kunz-Jacques, Sébastien and Muller, Frédéric and Ricordel, Pierre-Michel",
    	title = "{Cryptanalysis of the Tractable Rational Map Cryptosystem}",
    	booktitle = "Proceedings of Public Key Cryptography",
    	pages = "258-274",
    	year = 2005,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  12. Antoine Joux and Frédéric Muller. Two Attacks Against the HBB Stream Cipher. In Proceedings of FSE. 2005, 330-341. BibTeX

    @inproceedings{JoMu05,
    	author = "Joux, Antoine and Muller, Frédéric",
    	title = "{Two Attacks Against the HBB Stream Cipher}",
    	booktitle = "Proceedings of FSE",
    	pages = "330-341",
    	year = 2005,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  13. Eli Biham, Rafi Chen, Antoine Joux, Patrick Carribault, C Lemuet and William Jalby. Collisions of SHA-0 and Reduced SHA-1. In Proceedings of EUROCRYPT. 2005, 36-57. BibTeX

    @inproceedings{BCJ+05,
    	author = "Biham, Eli and Chen, Rafi and Joux, Antoine and Carribault, Patrick and C. Lemuet and Jalby, William",
    	title = "{Collisions of SHA-0 and Reduced SHA-1}",
    	booktitle = "Proceedings of EUROCRYPT",
    	pages = "36-57",
    	year = 2005,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  14. Michael Quisquater, Bart Preneel and Jean-Jacques Vandewalle. Spectral Characterization of Cryptographic Boolean Functions Satifying the (Extended) Propagation Criterium of Degree $l$ and Order $k$. Information Processing letters 93(1):25-28, 2005. BibTeX

    @article{QPVa05,
    	author = "Quisquater, Michael and Preneel, Bart and Vandewalle, Jean-Jacques",
    	title = "{Spectral Characterization of Cryptographic Boolean Functions Satifying the (Extended) Propagation Criterium of Degree $l$ and Order $k$}",
    	journal = "Information Processing letters",
    	year = 2005,
    	volume = 93,
    	number = 1,
    	pages = "25-28"
    }
    
  15. Louis Goubin and Jacques Patarin. Le hasard, une idée, un concept, un outil. Chapter La génération d'aléas sur ordinateur, L'Harmattan, 2005. BibTeX

    @inbook{GoPa05,
    	author = "Goubin, Louis and Patarin, Jacques",
    	title = "Le hasard, une idée, un concept, un outil",
    	chapter = "La génération d'aléas sur ordinateur",
    	publisher = "L'Harmattan",
    	year = 2005
    }
    
  16. Olivier Billet. Cryptologie Multivariable. UVSQ, 2005. BibTeX

    @phdthesis{Bill05,
    	author = "Billet, Olivier",
    	title = "Cryptologie Multivariable",
    	school = "UVSQ",
    	year = 2005,
    	month = ""
    }
    

  1. Mehdi-Laurent Akkar, Régis Bévan and Louis Goubin. Two Power Analysis Attacks against One-Mask Methods. In Proceedings of FSE. 2004. BibTeX

    @inproceedings{ABGo04,
    	author = "Akkar, Mehdi-Laurent and Bévan, Régis and Goubin, Louis",
    	title = "{Two Power Analysis Attacks against One-Mask Methods}",
    	booktitle = "Proceedings of FSE",
    	year = 2004,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  2. Pierre-Alain Fouque, Antoine Joux and Guillaume Poupard. Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes. In Proceedings of SAC. 2004, 212-226. BibTeX

    @inproceedings{FJPo04,
    	author = "Fouque, Pierre-Alain and Joux, Antoine and Poupard, Guillaume",
    	title = "{Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes}",
    	booktitle = "Proceedings of SAC",
    	pages = "212-226",
    	year = 2004,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  3. Antoine Joux. Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions. In Proceedings of CRYPTO 3152. 2004, 306-316. BibTeX

    @inproceedings{Joux04,
    	author = "Joux, Antoine",
    	title = "{Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions}",
    	booktitle = "Proceedings of CRYPTO",
    	pages = "306-316",
    	year = 2004,
    	volume = 3152,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  4. Alex Biryukov, Christophe De Cannière and Michael Quisquater. On Multiple Linear Approximations. In Proceedings of CRYPTO 3152. 2004, 1-22. BibTeX

    @inproceedings{BCQu04,
    	author = "Biryukov, Alex and De Cannière, Christophe and Quisquater, Michael",
    	title = "{On Multiple Linear Approximations}",
    	booktitle = "Proceedings of CRYPTO",
    	pages = "1-22",
    	year = 2004,
    	volume = 3152,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  5. Jacques Patarin. Security of Random Feistel Schemes with 5 or more Rounds. In Proceedings of CRYPTO 3152. 2004, 106-122. BibTeX

    @inproceedings{Pata04,
    	author = "Patarin, Jacques",
    	title = "{Security of Random Feistel Schemes with 5 or more Rounds}",
    	booktitle = "Proceedings of CRYPTO",
    	pages = "106-122",
    	year = 2004,
    	volume = 3152,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  6. Audrey Montreuil and Jacques Patarin. The Marriage Proposal Problem: Fair and Efficient Solution for Two-Party Computations. In Proceedings of INDOCRYPT 3348. 2004, 33-47. BibTeX

    @inproceedings{MoPa04,
    	author = "Montreuil, Audrey and Patarin, Jacques",
    	title = "{The Marriage Proposal Problem: Fair and Efficient Solution for Two-Party Computations}",
    	booktitle = "Proceedings of INDOCRYPT",
    	pages = "33-47",
    	year = 2004,
    	volume = 3348,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  7. Louis Goubin, Christian Mauduit and Andras Sarközy. Construction of large families of pseudo-random binary sequences. Journal of Number Theory 106(1):56-69, 2004. BibTeX

    @article{GMSa04,
    	author = "Goubin, Louis and Mauduit, Christian and Sarközy, Andras",
    	title = "{Construction of large families of pseudo-random binary sequences}",
    	journal = "Journal of Number Theory",
    	year = 2004,
    	volume = 106,
    	number = 1,
    	pages = "56-69"
    }
    
  8. Antoine Joux. A One Round Protocol for Tripartite Diffie-Hellman. J. Cryptology 17(4):263-276, 2004. BibTeX

    @article{Joux04a,
    	author = "Joux, Antoine",
    	title = "{A One Round Protocol for Tripartite Diffie-Hellman}",
    	journal = "J. Cryptology",
    	year = 2004,
    	volume = 17,
    	number = 4,
    	pages = "263-276"
    }
    
  9. Mehdi-Laurent Akkar. Attaque et Méthodes de Protections de Systèmes Cryptographiques Embarqués. UVSQ, 2004. BibTeX

    @phdthesis{Akka04,
    	author = "Akkar, Mehdi-Laurent",
    	title = "Attaque et Méthodes de Protections de Systèmes Cryptographiques Embarqués",
    	school = "UVSQ",
    	year = 2004,
    	month = ""
    }
    
  10. Michael Quisquater. Applications of Character Theory and the Möbius Inversion Principle to the Study of Cryptographic Properties of Boolean Functions. Katholieke Universiteit Leuven, 2004. BibTeX

    @phdthesis{ Quis04,
    	author = "Quisquater, Michael",
    	title = "Applications of Character Theory and the Möbius Inversion Principle to the Study of Cryptographic Properties of Boolean Functions",
    	school = "Katholieke Universiteit Leuven",
    	year = 2004,
    	month = ""
    }
    

 Imprimer 

DMC Firewall is developed by Dean Marshall Consultancy Ltd